McAfee Intros Mobile Security Risk MgtMcAfee Intros Mobile Security Risk Mgt
McAfee announced the launch of McAfee Mobile Security Risk Management
February 1, 2007
SANTA CLARA, Calif. -- McAfee, Inc. (NYSE: MFE) today announced the launch of McAfeeR Mobile Security Risk Management, a new modular three-prong approach to enable mobile operators to counter the increasing threats posed by malicious and abusive content and create a secure framework on which to build future services.
McAfee Mobile Security Risk Management is the industry's most comprehensive approach to mobile security. The approach enables mobile operators to understand and mitigate security risks to their business, protect and give peace of mind to customers and avoid the negative impact on their brand and business from malicious attacks.
Evolving mobile security threats
With more than 2.5 billion global mobile subscribers and close to 1 billion shipments of handset devices in 2006, mobile services are expanding globally with increasingly diverse functionality. Driven by further platform consolidation, connectivity, bandwidth and impressive new device capabilities, the mobile environment is increasingly becoming a target for malicious attacks. McAfee is also seeing a shift from mere vandalism to more sophisticated, social engineered for-profit malware. 2006 saw the emergence of both SMiShing (phishing via SMS) and spyware (MobiSpy) in the mobile domain. As new threats use widely deployed services (text messaging) or phones features (including Java), Mobile Security affects Mobile Network Operators businesses beyond just smartphones.
McAfee Mobile Security Risk Management
In the context of these evolving security threats, McAfee is able to offer a comprehensive, proven solution to mobile operators. McAfee Mobile Security Risk Management provides operators with a professional risk assessment of the threats to their business, comprehensive protection for the network, devices, content and applications and effective recovery services from malware outbreaks.
The solution is comprised of three modules which can be delivered individually or as an integrated solution:
About the Author(s)
You May Also Like
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023